Notice*: You must perform the same operation for all Internet browser shortcuts, including those in your Programs list and taskbar.

2. On the “Shortcut” tab, look in the “Target” field and delete the“http://aartemis.com” value written after “iexplore.exe” (for IE shortcut) or “firefox.exe” (for Firefox Shortcut), or “chrome.exe” (for chrome shortcut) and choose “OK” *

* Press “Continue” when asked to “Provide administrator permission to change these settings”.

Step 4. Clean your computer from remaining malicious threats.

Download and install one of the most reliable FREE anti malware programs today to clean your computer from remaining malicious threats. If you want to stay constantly protected from malware threats, existing and future ones, we recommend that you install Malwarebytes Anti-Malware PRO:

1. Run "Malwarebytes Anti-Malware" and allow the program to update to it's latest version and malicious database if needed.

2. When the "Malwarebytes Anti-Malware" main window appears on your screen, choose the "Perform quick scan" option and then press "Scan" button and let the program scan your system for threats.

3. When the scanning is completed, press “OK” to close the information message and then press the "Show results" button to view and remove the malicious threats found.

4. At the "Show Results" window check – using your mouse's left button- all the infected objects and then choose the "Remove Selected" option and let the program remove the selected threats.

5. When the removal of infected objects process is complete, "Restart your system to remove all active threats properly"

6. Continue to the next step.

Advice: To ensure your computer is clean and safe, perform a Malwarebytes’ Anti-Malware full scan in windows “Safe mode“.*

*To get into Windows Safe mode, press the “F8” key as your computer is booting up, before the appearance of the Windows logo. When the “Windows Advanced Options Menu” appears on your screen, use your keyboard arrows keys to move to the Safe Mode option and then press “ENTER“.

Step 5. Clean unwanted files and entries.

Use “CCleaner” program and proceed to clean your system from temporary Internet files and invalid registry entries.*

*If you don’t know how to install and use “CCleaner”, read these instructions.

If this article was useful for you, please consider supporting us by making a donation. Even $1 can a make a huge difference for us in our effort to continue to help others while keeping this site free:

If you want to stay constantly protected from malware threats, existing and future ones, we recommend that you install Malwarebytes Anti-Malware PRO by clicking below (we
do earn a commision from sales generated from this link, but at no additional cost to you. We have experience with this software and we recommend it because it is helpful and useful):